Vulnerability Description
Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.0 |
References
- http://marc.info/?l=linux-kernel&m=113932292516359&w=2
- http://secunia.com/advisories/19374PatchVendor Advisory
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/21614
- http://www.debian.org/security/2006/dsa-1017Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
- http://www.osvdb.org/24098Patch
- http://www.securityfocus.com/bid/17216Patch
- https://usn.ubuntu.com/281-1/
- http://marc.info/?l=linux-kernel&m=113932292516359&w=2
- http://secunia.com/advisories/19374PatchVendor Advisory
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/21614
- http://www.debian.org/security/2006/dsa-1017Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
FAQ
What is CVE-2006-1066?
CVE-2006-1066 is a vulnerability with a CVSS score of 1.2 (LOW). Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps,...
How severe is CVE-2006-1066?
CVE-2006-1066 has been rated LOW with a CVSS base score of 1.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1066?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.